An anonymous asymmetric public key traitor tracing scheme

Eun Young Choi, Jung Yeon Hwang, Dong Hoon Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber’s anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously, but anonymity control is provided, i.e., a data supplier can trace traitors. Our scheme is constructed based on an asymmetric public-key traitor tracing scheme with one trustee.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
PublisherSpringer Verlag
Pages104-114
Number of pages11
Volume2738
ISBN (Print)3540408088, 9783540408086
DOIs
Publication statusPublished - 2003
Event4th International Conference on E-Commerce and Web Technology, EC-Web 2003 - Prague, Czech Republic
Duration: 2003 Sep 22003 Sep 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume2738
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other4th International Conference on E-Commerce and Web Technology, EC-Web 2003
CountryCzech Republic
CityPrague
Period03/9/203/9/5

    Fingerprint

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Choi, E. Y., Hwang, J. Y., & Lee, D. H. (2003). An anonymous asymmetric public key traitor tracing scheme. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2738, pp. 104-114). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 2738). Springer Verlag. https://doi.org/10.1007/b11826